General
-
Target
60c4702f305a6dfde41f860739de4d6e875d05d7e6f926fc4dc0578c9ae5aa40
-
Size
836KB
-
Sample
241104-q82p7azmgz
-
MD5
cef09fae1d25063d125e3955b88d0f26
-
SHA1
67bbca05c5f2d6d43df98051870e7054990139aa
-
SHA256
60c4702f305a6dfde41f860739de4d6e875d05d7e6f926fc4dc0578c9ae5aa40
-
SHA512
ff745339ede40ee1891a2cc1d9121f2d2826539140c85feb7ed56e09f9856c12f2f92e1dfc081dee92f937a6965c9d739da645eea538fc2b3d0e383ca308eaf1
-
SSDEEP
24576:Wy+ZAwomTTboGyMvU4nu9fb91ffixwL1R674:lsAJmT/yBJz91fCwL1RE
Static task
static1
Behavioral task
behavioral1
Sample
60c4702f305a6dfde41f860739de4d6e875d05d7e6f926fc4dc0578c9ae5aa40.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
gena
193.233.20.30:4125
-
auth_value
93c20961cb6b06b2d5781c212db6201e
Targets
-
-
Target
60c4702f305a6dfde41f860739de4d6e875d05d7e6f926fc4dc0578c9ae5aa40
-
Size
836KB
-
MD5
cef09fae1d25063d125e3955b88d0f26
-
SHA1
67bbca05c5f2d6d43df98051870e7054990139aa
-
SHA256
60c4702f305a6dfde41f860739de4d6e875d05d7e6f926fc4dc0578c9ae5aa40
-
SHA512
ff745339ede40ee1891a2cc1d9121f2d2826539140c85feb7ed56e09f9856c12f2f92e1dfc081dee92f937a6965c9d739da645eea538fc2b3d0e383ca308eaf1
-
SSDEEP
24576:Wy+ZAwomTTboGyMvU4nu9fb91ffixwL1R674:lsAJmT/yBJz91fCwL1RE
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1